• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 97
Next 10 →

© Author(s) 2015. CC Attribution 3.0 License.

by T. J. Troy, M. Konar, V. Srinivasan, S. Thompson , 2015
"... www.hydrol-earth-syst-sci.net/19/3667/2015/ doi:10.5194/hess-19-3667-2015 ..."
Abstract - Add to MetaCart
www.hydrol-earth-syst-sci.net/19/3667/2015/ doi:10.5194/hess-19-3667-2015

ative Commons Attribution Non-Commercial No Derivatives licence. Researchers

by Victor Faion
"... I herewith certify that all material in this dissertation which is not my own work has been properly acknowledged. ..."
Abstract - Add to MetaCart
I herewith certify that all material in this dissertation which is not my own work has been properly acknowledged.

De-indirection for Flash-based Solid State Drives

by Yiying Zhang, University Of Wisconsin-madison, Prof Shan Lu, Prof Paul Barford, Prof Jude, W. Shavlik , 2013
"... ii iv vTo my parents vi vii Acknowledgements I would first and foremost extend my whole-hearted gratitude to my advisors, An-drea Arpaci-Dusseau and Remzi Arpaci-Dusseau. Andrea and Remzi are the reason that I had the opportunity for this exceptional Ph.D. journey. To this day, I still re-member the ..."
Abstract - Add to MetaCart
in systems research happened when I took Remzi’s Advanced Operating Systems

APractical Lattice-based Digital Signature Schemes

by unknown authors
"... Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case o ..."
Abstract - Add to MetaCart
to be intractable by quantum computers. Due to significant research advancements in recent years, lattice-based schemes have now become practical and appear to be a very viable alternative to number-theoretic cryptography. In this paper we focus on recent developments and the current state-of-the-art in lattice-based

including © notice, is given to the source. Banking System Stability: A Cross-Atlantic Perspective

by Stefan Straetmans, Casper De Vries, Stefan Straetmans, Casper De Vries , 2005
"... Paper prepared for the NBER project on “Risks of Financial Institutions”. We benefited from suggestions and criticism by many participants in the NBER project on “Risks of financial institutions”, in particular by the organizers Mark Carey (also involving Dean Amel and Allen Berger) and Rene Stulz, ..."
Abstract - Add to MetaCart
Paper prepared for the NBER project on “Risks of Financial Institutions”. We benefited from suggestions and criticism by many participants in the NBER project on “Risks of financial institutions”, in particular by the organizers Mark Carey (also involving Dean Amel and Allen Berger) and Rene Stulz, by our discussant Tony Saunders and by Patrick de Fontnouvelle, Gary Gorton, Andy Lo, Jim O’Brien and Eric Rosengren. Furthermore, we are grateful for comments we received at the 2004 European Finance Association Meetings in Maastricht, in particular by our discussant Marco da Rin and by Christian Upper, at the 2004 Ottobeuren seminar in economics, notably the thoughts of our discussant Ernst Baltensberger, of Friedrich Heinemann and of Gerhard Illing, as well as at seminars of the Max Planck Institute for Research on Collective Goods, the Federal Reserve Bank of St. Louis, the ECB and the University of Frankfurt. Gabe de Bondt and David Marques Ibanez supported us enormously in finding yield spread data, Lieven Baele and Richard Stehle kindly made us aware of pitfalls in Datastream equity data. Very helpful research assistance by Sandrine Corvoisier, Peter Galos and Marco Lo Duca as well as editorial support by Sabine Wiedemann are gratefully acknowledged. Any views expressed only reflect those of the authors and should not be interpreted as the ones of the ECB or the Eurosystem. The views expressed herein are those of the author(s) and do not necessarily reflect the views of the National Bureau of Economic Research.

CORRECTING FOR PRECIPITATION EFFECTS IN SATELLITE-BASED PASSIVE MICROWAVE TROPICAL CYCLONE INTENSITY ESTIMATES

by Capt Wacker Robert S, Robert S. Wacker , 2005
"... Public reporting burden for this collection of Information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments ..."
Abstract - Add to MetaCart
Public reporting burden for this collection of Information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send

Working Paper No. 2 Cost of Capital Effects and Changes in Growth Expectations around U.S. Cross-Listings

by Luzi Hail, Christian Leuz, Luzi Hail , 2006
"... This paper examines whether cross-listing in the U.S. reduces foreign firms ’ cost of capital. While prior studies document that U.S. cross-listings are associated with substantial increases in firm value, the sources of these valuation effects are not well understood. We estimate the cost of capita ..."
Abstract - Add to MetaCart
This paper examines whether cross-listing in the U.S. reduces foreign firms ’ cost of capital. While prior studies document that U.S. cross-listings are associated with substantial increases in firm value, the sources of these valuation effects are not well understood. We estimate the cost

doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine

by Zhongqiang Chen, Yuan Zhang, Zhongrong Chen, Alex Delis , 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract - Add to MetaCart
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-world network traffic is largely legitimate and that telltales manifested by exploits rarely appear in network streams lead us to the proposal of Fingerprinter. This framework integrates fingerprinting and PM methods to rapidly distinguish well-behaved from malicious traffic. Fingerprinter produces concise digests or fingerprints for attack signatures during its programming phase. In its querying phase, the framework quickly identifies attack-free connections by transforming input traffic into its fingerprint space and matching its digest against those of attack signatures. If the legitimacy of a stream cannot be determined by fingerprints alone, our framework uses the Boyer–Moore algorithm to ascertain whether attack signatures appear in the stream. To reduce false matches, we resort to multiple fingerprinting techniques including Bloom–Filter and Rabin–Fingerprint. Experimentation with a prototype and a variety of traces has helped us establish that Fingerprinter significantly accelerates the attack detection process.

Design and Implementation for an Android based Massively Multiplayer Online Augmented Reality Game Entwurf und Implementierung für ein Android basiertes Massively Multiplayer Online Augmented Reality Game

by Denis Lapiner, Gutachten Prof Alej, Ro Buchmann, Gutachten Max Lehn, Tag Der Einreichung , 2014
"... Hiermit versichere ich, die vorliegende Master-Thesis ohne Hilfe Dritter nur mit den an-gegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbeh ..."
Abstract - Add to MetaCart
Prüfungsbehörde vorgelegen. Darmstadt, den 28th February 2014 (Denis Lapiner) This Master’s Thesis proposes and implements a game design for an Android based massively multiplayer online augmented reality game. The proposed game design is based on an analysis of other popular aug-mented reality games

Perspective An Online Bioinformatics Curriculum

by David B. Searls
"... Abstract: Online learning initia-tives over the past decade have become increasingly comprehen-sive in their selection of courses and sophisticated in their presen-tation, culminating in the recent announcement of a number of consortium and startup activities that promise to make a university educat ..."
Abstract - Add to MetaCart
Abstract: Online learning initia-tives over the past decade have become increasingly comprehen-sive in their selection of courses and sophisticated in their presen-tation, culminating in the recent announcement of a number of consortium and startup activities that promise to make a university
Next 10 →
Results 1 - 10 of 97
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University